Author of the publication

A methodology for unit testing actors in proprietary discrete event based simulations.

, , , and . WSC, page 1012-1019. WSC, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection in Automation Controllers., , , and . Critical Infrastructure Protection, volume 636 of IFIP Advances in Information and Communication Technology, page 97-118. Springer, (2021)Multi-channel Security Through Data Fragmentation., , , and . Critical Infrastructure Protection, volume 596 of IFIP Advances in Information and Communication Technology, page 137-155. Springer, (2020)Assessing the Cyber Risk of Small Unmanned Aerial Vehicles., and . Critical Infrastructure Protection, volume 596 of IFIP Advances in Information and Communication Technology, page 45-67. Springer, (2020)InfiniBand Network Monitoring: Challenges and Possibilities., , , and . Critical Infrastructure Protection, volume 636 of IFIP Advances in Information and Communication Technology, page 187-208. Springer, (2021)Securing an InfiniBand Network and its Effect on Performance., , , , and . Critical Infrastructure Protection, volume 596 of IFIP Advances in Information and Communication Technology, page 157-179. Springer, (2020)Integrating disruption-prone links into reliable networks: a transmission control protocol friendly approach., , , and . IET Commun., 6 (12): 1702-1709 (2012)Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric., , , and . Critical Infrastructure Protection, volume 570 of IFIP Advances in Information and Communication Technology, page 137-156. Springer, (2019)An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks., , , and . HICSS, page 292. IEEE Computer Society, (2007)Fundamental Limits on Synchronizing Clocks Over Networks., , and . IEEE Trans. Autom. Control., 56 (6): 1352-1364 (2011)The Z-Wave routing protocol and its security implications., , , , and . Comput. Secur., (2017)